Proceedings Eighth Working Conference on Reverse Engineering最新文献

筛选
英文 中文
Reverse engineering to achieve maintainable WWW sites 逆向工程实现可维护的WWW站点
Proceedings Eighth Working Conference on Reverse Engineering Pub Date : 2001-10-02 DOI: 10.1109/WCRE.2001.957829
C. Boldyreff, R. Kewish
{"title":"Reverse engineering to achieve maintainable WWW sites","authors":"C. Boldyreff, R. Kewish","doi":"10.1109/WCRE.2001.957829","DOIUrl":"https://doi.org/10.1109/WCRE.2001.957829","url":null,"abstract":"The growth of the World Wide Web and the accelerated development of web sites and associated web technologies has resulted in a variety of maintenance problems. The maintenance problems associated with web sites and the WWW are examined. It is argued that currently web sites and the WWW lack both data abstractions and structures that could facilitate maintenance. A system to analyse existing web sites and extract duplicated content and style is described here. In designing the system, existing reverse engineering techniques have been applied, and a case for further application of these techniques is made in order to prepare sites for their inevitable evolution in future.","PeriodicalId":150878,"journal":{"name":"Proceedings Eighth Working Conference on Reverse Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122096356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
Modeling the system-user dialog using interaction traces 使用交互跟踪对系统-用户对话框进行建模
Proceedings Eighth Working Conference on Reverse Engineering Pub Date : 2001-10-02 DOI: 10.1109/WCRE.2001.957825
M. El-Ramly, P. Iglinski, Eleni Stroulia, P. Sorenson, Bruce Matichuk
{"title":"Modeling the system-user dialog using interaction traces","authors":"M. El-Ramly, P. Iglinski, Eleni Stroulia, P. Sorenson, Bruce Matichuk","doi":"10.1109/WCRE.2001.957825","DOIUrl":"https://doi.org/10.1109/WCRE.2001.957825","url":null,"abstract":"It is generally the case that some user interface (UI) reverse engineering is needed for every non-trivial reengineering project. Typically, this is done through code analysis, which can be very difficult and/or expensive. When code analysis is not a must, as for wrapping purposes, system-user interaction can be an alternative input for the reverse engineering process. In the CelLEST project, we have developed a prototype, called LeNDI (Legacy Navigation Domain Identifier), to test this idea. LeNDI records traces of the legacy screen snapshots and user actions, while the user interacts with the legacy system. Then, it extracts a set of features for every snapshot and employs artificial intelligence methods to build a model of the legacy UI, called the state-transition graph. LeNDI uses two clustering methods to group similar snapshots together as one system screen modeled by one node on the graph. LeNDI uses the user actions recorded in traces to model the behavior of the legacy screens as the graph arcs. Evaluation results of this process are encouraging. The state-transition graph is used to classify each individual snapshot forwarded by the legacy system to the user while he interacts with it and is a main input to the forward engineering phase of the project.","PeriodicalId":150878,"journal":{"name":"Proceedings Eighth Working Conference on Reverse Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123986315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Reengineering relational databases to object-oriented: constructing the class hierarchy and migrating the data 将关系数据库重新设计为面向对象:构造类层次结构并迁移数据
Proceedings Eighth Working Conference on Reverse Engineering Pub Date : 2001-10-02 DOI: 10.1109/WCRE.2001.957840
R. Alhajj, Faruk Polat
{"title":"Reengineering relational databases to object-oriented: constructing the class hierarchy and migrating the data","authors":"R. Alhajj, Faruk Polat","doi":"10.1109/WCRE.2001.957840","DOIUrl":"https://doi.org/10.1109/WCRE.2001.957840","url":null,"abstract":"The object-oriented data model is predicted to be the heart of the next generation of database systems. Users want to move from old legacy databases into applying this new technology that provides extensibility and flexibility in maintenance. However, a major limitation on the wide acceptance of object-oriented databases is the amount of time and money invested on existing database applications, which are based on conventional legacy systems. Users do not want to loose the huge amounts of data present in conventional databases. This paper presents a novel approach to transform a given conventional database into an object-oriented database. It is assumed that the necessary characteristics of the conventional database to be re-engineered are known and available. The source of these characteristics might be the data dictionary and/or an expert in the given conventional database. We implemented a system that builds an understanding of a given conventional database by taking these characteristics as input and produces the corresponding object-oriented database as output. The system derives a graph that summarizes the conceptual model. Links in the graph are classified into inheritance links and aggregation links. This classification leads to the class hierarchy. Finally, we handle the migration of data from the conventional database to the constructed object-oriented database.","PeriodicalId":150878,"journal":{"name":"Proceedings Eighth Working Conference on Reverse Engineering","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116628334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Wrapping legacy COBOL programs behind an XML-interface 将遗留的COBOL程序封装在xml接口后面
Proceedings Eighth Working Conference on Reverse Engineering Pub Date : 2001-10-02 DOI: 10.1109/WCRE.2001.957823
H. Sneed
{"title":"Wrapping legacy COBOL programs behind an XML-interface","authors":"H. Sneed","doi":"10.1109/WCRE.2001.957823","DOIUrl":"https://doi.org/10.1109/WCRE.2001.957823","url":null,"abstract":"This paper describes the tools and techniques for encapsulating host COBOL programs with an XML interface. The legacy programs are divided into three classes - online programs, batch programs and subprograms. For each program type, a different wrapping technique and a different tool is employed. Online programs are transformed into data-driven subprograms which process an XML document. Batch programs are adapted to read and write XML documents. Subprograms are left unchanged, but their parameters are set from an XML document. By using XML to implement corporate portals, it has proven possible to reuse existing host programs within new intranet/Internet systems, thus reducing system development costs and development time by more than 60%.","PeriodicalId":150878,"journal":{"name":"Proceedings Eighth Working Conference on Reverse Engineering","volume":"490 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123057174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
A retrospective on industrial database reverse engineering projects. 1 工业数据库逆向工程项目回顾。1
Proceedings Eighth Working Conference on Reverse Engineering Pub Date : 2001-10-02 DOI: 10.1109/WCRE.2001.957817
M. Blaha
{"title":"A retrospective on industrial database reverse engineering projects. 1","authors":"M. Blaha","doi":"10.1109/WCRE.2001.957817","DOIUrl":"https://doi.org/10.1109/WCRE.2001.957817","url":null,"abstract":"This paper presents a compilation of results from the reverse engineering of 35 databases. All the work was performed by the same reverse engineer (the author) over the past nine years. Since the quantity of data is large, it has been split between two papers.","PeriodicalId":150878,"journal":{"name":"Proceedings Eighth Working Conference on Reverse Engineering","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126415828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Wrapper development for legacy data reuse 用于遗留数据重用的包装器开发
Proceedings Eighth Working Conference on Reverse Engineering Pub Date : 2001-10-02 DOI: 10.1109/WCRE.2001.957824
Philippe Thiran, Jean-Luc Hainaut
{"title":"Wrapper development for legacy data reuse","authors":"Philippe Thiran, Jean-Luc Hainaut","doi":"10.1109/WCRE.2001.957824","DOIUrl":"https://doi.org/10.1109/WCRE.2001.957824","url":null,"abstract":"This paper is devoted to the technology of wrappers for legacy data systems reuse. Their characteristics are outlined and a generic wrapper architecture is defined. This architecture is intended to be instantiated for specific legacy data models and systems. A general methodology is proposed to define the architecture components. The methodology is supported by an operational CASE tool that helps developers to generate wrappers.","PeriodicalId":150878,"journal":{"name":"Proceedings Eighth Working Conference on Reverse Engineering","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125606600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Parsing in a hostile world 在一个充满敌意的世界里解析
Proceedings Eighth Working Conference on Reverse Engineering Pub Date : 2001-10-02 DOI: 10.1109/WCRE.2001.957834
D. Blasband
{"title":"Parsing in a hostile world","authors":"D. Blasband","doi":"10.1109/WCRE.2001.957834","DOIUrl":"https://doi.org/10.1109/WCRE.2001.957834","url":null,"abstract":"The paper describes a formalization and development effort aimed at automating the production of parsers for languages for which the common classifications (LALR (F. DeRemer and T.J. Pennello, 1982; B.B. Kristensen and O.L. Madsen, 1981), LL), and even the common division of labor between lexical and syntactical analysis, do not apply. This effort, implemented in tools named DURA and lexyt, aims at real-world applications of parsing technology, applied to software renovation prior to plain compilers, rather than theoretical soundness only. A number of industrial results, around a tool named RainCode, are also described.","PeriodicalId":150878,"journal":{"name":"Proceedings Eighth Working Conference on Reverse Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115111363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
REportal: a Web-based portal site for reverse engineering REportal:用于逆向工程的基于web的门户网站
Proceedings Eighth Working Conference on Reverse Engineering Pub Date : 2001-10-02 DOI: 10.1109/WCRE.2001.957826
S. Mancoridis, Timothy S. Souder, Y. Chen, E. Gansner, Jeffrey L. Korn
{"title":"REportal: a Web-based portal site for reverse engineering","authors":"S. Mancoridis, Timothy S. Souder, Y. Chen, E. Gansner, Jeffrey L. Korn","doi":"10.1109/WCRE.2001.957826","DOIUrl":"https://doi.org/10.1109/WCRE.2001.957826","url":null,"abstract":"We present a Web-based portal site for the reverse engineering of software systems, called REportal (Reverse Engineering portal). REportal enables authorized users to upload their code to a secure Web site and then, through the guidance of wizards, to browse and analyze their code. Currently, the portal services include code analysis, browsing, querying and design extraction for C, C++ and Java programs. The REportal services are implemented by several reverse engineering tools that our team has developed over the years. With this work, we aim to assist professional software engineers, educators and other researchers who need to analyze code. Specifically, we present a technology that provides a simple and easily accessible user interface to a number of reverse engineering tools. More importantly, this technology saves the user from the time and effort required to install, administer and integrate these tools.","PeriodicalId":150878,"journal":{"name":"Proceedings Eighth Working Conference on Reverse Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127444229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Flexible reverse engineering of web pages with VAQUISTA 灵活的网页逆向工程与VAQUISTA
Proceedings Eighth Working Conference on Reverse Engineering Pub Date : 2001-10-02 DOI: 10.1109/WCRE.2001.957828
J. Vanderdonckt, L. Bouillon, N. Souchon
{"title":"Flexible reverse engineering of web pages with VAQUISTA","authors":"J. Vanderdonckt, L. Bouillon, N. Souchon","doi":"10.1109/WCRE.2001.957828","DOIUrl":"https://doi.org/10.1109/WCRE.2001.957828","url":null,"abstract":"VAQUISTA allows developers to reverse engineer a presentation model of a web page according to multiple reverse engineering options. The alternatives offered by these options not only widen the spectrum of possible presentation models but also encourage developers in exploring multiple reverse engineering strategies. The options provide filtering capabilities in a static analysis of HTML code that are targeted either at multiple widgets simultaneously or at single widgets at a time, for their attributes and other manipulations. This flexibility is particularly important when the presentation model is itself used to migrate the presentation of the web page to other types of user interfaces, possibly written in different languages, in different computing platforms.","PeriodicalId":150878,"journal":{"name":"Proceedings Eighth Working Conference on Reverse Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132083434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
Union schemas as a basis for a C++ extractor 作为c++提取器基础的联合模式
Proceedings Eighth Working Conference on Reverse Engineering Pub Date : 2001-10-02 DOI: 10.1109/WCRE.2001.957810
T. Dean, A. Malton, R. Holt
{"title":"Union schemas as a basis for a C++ extractor","authors":"T. Dean, A. Malton, R. Holt","doi":"10.1109/WCRE.2001.957810","DOIUrl":"https://doi.org/10.1109/WCRE.2001.957810","url":null,"abstract":"An extractor is a program which processes source code and outputs facts about the code in a software exchange format (SEF). An SEF can be further specified by a schema, analogous to a schema for a database. This paper explains how two such schemas can be combined into a union schema as the basis for creating an extractor. We describe CPPX (C Plus Plus eXtractor), which transforms a schema designed as the internals of a compiler (GCC) to a schema designed for software exchange (Datrix). CPPX performs this transformation as a pipelined sequence of sub-transformations. At each stage in the pipeline, the intermediate data conforms to the union of the two schemas.","PeriodicalId":150878,"journal":{"name":"Proceedings Eighth Working Conference on Reverse Engineering","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132088641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信